Sciweavers

1432 search results - page 39 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
143
Voted
CSFW
2007
IEEE
15 years 9 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
WOSP
2000
ACM
15 years 7 months ago
Expressing meaningful processing requirements among heterogeneous nodes in an active network
Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, nonhomogeneous processing can ...
Virginie Galtier, Kevin L. Mills, Yannick Carlinet...
COMPSAC
2009
IEEE
15 years 10 months ago
Integrating System Modeling with Project Management - A Case Study
In software engineering projects, there are two different types of modeling tools. On the one hand, there are tools to model the system under construction, i.e. tools for requirem...
Jonas Helming, Jörn David, Maximilian Koegel,...
SAC
2004
ACM
15 years 8 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
AOSE
2007
Springer
15 years 7 months ago
Refining Goal Models by Evaluating System Behaviour
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...